| 000 | 01242nam a22001817a 4500 | ||
|---|---|---|---|
| 008 | 120326t xxu||||| |||| 00| 0 eng d | ||
| 040 |
_aES-MaBCA _cES-MaBCA |
||
| 100 |
_94198 _aTehan, Rita |
||
| 245 |
_aCybersecurity _h[Recurso electrónico] PDF _b: Legislation, Hearings, and Executive Branch Documents |
||
| 260 |
_bCongressional Research Service _cAugust 2015 |
||
| 300 | _aRecurso online, 49 p. | ||
| 490 |
_aCRS Report _vR43317 |
||
| 520 | _aCybersecurity vulnerabilities challenge governments, businesses, and individuals worldwide. Attacks have been initiated against individuals, corporations, and countries. Targets have included government networks, companies, and political organizations, depending upon whether the attacker was seeking military intelligence, conducting diplomatic or industrial espionage, engaging in cybercrime, or intimidating political activists. In addition, national borders mean little or nothing to cyberattackers, and attributing an attack to a specific location can be difficult, which may make responding problematic. | ||
| 650 | 0 |
_91698 _aSeguridad en las Tecnologías |
|
| 650 | 0 |
_91197 _aLegislación _zEstados Unidos |
|
| 856 | 4 |
_uhttp://www.fas.org/sgp/crs/misc/R43317.pdf _qPDF |
|
| 942 |
_2udc _cBK |
||
| 999 |
_c16835 _d16838 |
||